K. ZEBBICHE , F. KHELIFI and A. BOURIDANE

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Desynchronization Attacks on Watermarks
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Speech Enhancement Based on a Combination of Spectral Subtraction and MMSE Log-STSA Estimator in Wavelet Domain LATSI laboratory, Department of Electronic,
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Despeckle Filtering in Medical Ultrasound Imaging
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
ECED 4504 Digital Transmission Theory
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
1 Channel Coding (III) Channel Decoding. ECED of 15 Topics today u Viterbi decoding –trellis diagram –surviving path –ending the decoding u Soft.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DEPARTMENT OF ECE, BEC, BAGALKOT
WAVELET VIDEO PROCESSING TECHNOLOGY
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
DONE BY S.MURALIRAJAN M.NIRMAL
Protcting Fingerprint Data
Basic Concepts of Audio Watermarking
Increasing Watermarking Robustness using Turbo Codes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Information Theoretical Analysis of Digital Watermarking
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A New Method for Tamper Detection and Recovery
Department of Computer Science, University of Central Florida ,Orlando
Increasing Watermarking Robustness using Turbo Codes
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

K. ZEBBICHE , F. KHELIFI and A. BOURIDANE Multibit Decoding of Multiplicative Watermarking for Fingerprint Images K. ZEBBICHE , F. KHELIFI and A. BOURIDANE School of Electronics, Electrical Engineering and Computer Science Queen’s University Belfast In this talk, I am going to address the problem of u. I will .

Outline Introduction Proposed work Experimental results Conclusions In this presentation, I will first give a brief introduction to fingerprint-based systems and give some risks that may threat a fingerprint-based system, I will also introduce, in general, the watermarking techniques. After that, I will explain the different steps of the proposed work. Followed by experimental results and Finally I conclude my talk with a summary.

Introduction (Fingerprint-based Systems) Fingerprint-based authentication is the most mature, proven and widely used technique all over the world. Fingerprint-based system weaknesses: Not replaceable; Not secret; Several possible attacks may affect a biometric system. The fingerprint-based authentication is the most mature, proven and widely used technique all over the world. Although fingerprint data provide uniqueness, they do not provide secrecy because fingerprint data are: not replaceable :you can’t replace your fingerprint not secret: for example you can leave your fingerprint on any surface you touch, anyone can record your voice or get a photo of you. And most of all is that biometric systems may risk several threats. Ratha et al. described eight possible attacks in biometric system.

Introduction (Fingerprint-based attacks) Sensor Feature Extraction Matcher Stored Templates 1 3 2 4 5 8 6 7 1. Fake Biometrics 2. Replay Attack 3. Override 4. Tamper with features 5. Corruption match score 6. Tamper with templates (DB) 7. Intercept and modify 8. Override the final decision Ratha et al. described eight possible attacks in biometric system. To increase the security of the fingerprint data, some techniques have been introduced, among them, we find cryptography and watermarking (which is the technique used in our work). Solutions : Cryptography; Watermarking

Introduction (Watermarking Overview) Watermarking by definition is the fact to add an information to the host data. The embedded information may be recovered later on and used to check the authenticity of this host data. Embedding Decoding Detecting Watermark Extraction Detection Secret key K Watermark Insertion b x Pz/y z y Channel Exist Not Exist General model of a watermarking system. Watermarking by definition is the fact to add an information (ID, or logo) called watermark to the host data to be watermarked such that the watermark is unobtrusive, secure and also partly or fully be recovered from the host data later on. A general model of a watermarking system is given in this figure. In general, two stages can be described : The embedding stage : which aims to embed a watermark into an image while keeping the visual appearance of the image unaltered. this watermarked image is usually Transmitted trough a channel or stored in databases. In the second stage, which called also the receiver side, two processes can be defined: The watermark decoding or extraction : which aims to estimate the hidden the information bits. And the watermark detection : which aims to detect the presence or not of a given watermark.

Introduction (Watermarking Fingerprint Images) Protecting the originality of fingerprint images; Fraud detection in fingerprint images; Guaranteed secure transmission. Watermarking of fingerprint images can be used in applications like: Protecting the originality of fingerprint images stored in databases against intentional and unintentional attacks, b) Fraud detection in fingerprint images by means of fragile watermarks (which do not resist to any operations on the data and get lost, thus indicating possible tampering of the data), c) Guaranteeing secure transmission of acquired fingerprint images from intelligence agencies to a central image database.

Proposed work (Watermark embedding) The watermark is embedded into high resolution subbands of the DWT. Watermark is embedded in spread-spectrum fashion. The DWT subband is partitioned into blocks and every block carries one bit. Pseudo random sequence is also divided into chunks. Every chunk is multiplied by +1 (or -1) according to the information bit to get an amplitude-modulated watermark. A multiplicative rule is used to embed the watermark. in our work and for the embedding process, we propose to embed the watermark bits: * into high resolution subbands of the DWT for imperceptibility reasons. Watermark is embedded in spread-spectrum fashion, which means that one bit is carried by a set of coefficients. The DWT subband is partitioned into blocks and every block carries one bit. Pseudo random sequence which is also divided into chunks. every chunk is associated the one bit and multiplied by 1 or -1 according to its associated bit to get an amplitude-modulated watermark. * The multiplicative rule is used to embed the watermark.

Proposed work (Watermark embedding) bk Encoder Message Strength γ PRS Generator m Mk Secret key K Dividing Watermarked Image y x xk Original Image DWT Partitioning Reconstructing IDWT The embedding process is summarized by this block diagram. A discrete wavelet transform is applied to the original image to obtain the different subbands. Each subband is partitioned into blocks and every block will be used to carry one bit. Then, a pseudo random sequence is generated using a secret key and this sequence is divided into chunks. Every chunk is multiplied by one bit information to get an amplitude modulated watermark which is inserted into the blocks using the multiplicative rule. Note that the value to each coefficient is controlled by a factor called the strength of the watermark. After that, the watermarked blocks are gathered to reconstitute the marked subbands and an inverse discrete wavelet transform is applied to these marked suubands to obtain the watermarked image. Block diagram of the watermark embedding process

Proposed method (Watermark Decoding ) By assuming equally probable information bits. The optimum decoding is based on the maximum-likelihood estimation scheme. The DWT coefficients are modelled by the generalized Gaussian distribution (GGD). The GGD parameters are estimated directly from the watermarked image. The main concepts of the decodeing side are : - We assume that all information bits are equally probable which means that all the possible information bits could be hidden in the watermarked image. - The optimum decoding is based on the maximum- likelihood scheme which requires an accurate statistical modelling of the DWT coefficients, and the optimality of the proposed decoder depends on the accuracy of the modelling of these coefficients. - It has been found that the generalized Gaussian is the best distribution that can model the DWT coefficients. - The GGD parameters are estimated directly from the watermarked image.

Proposed method (Watermark Decoding ) α ,β Watermarked Image x xk Estimating α and β DWT Partitioning m Mk PRS Generator Decoded Message Secret key K Dividing Decoder The decoding process is summarized by this block diagram. A discrete wavelet transform is applied to the watermarked image to obtain the different subbands. Each subband is partitioned into blocks as in the embedding side. The GGD parameters of each block is then estimated. Then, a pseudo random sequence is generated using the same secret key used in the embedding and this sequence is divided into chunks. The decoder uses the estimated parameters And the chunks to estimate the embedded information bits. Strength γ Block diagram of the watermark decoding process

Experimental results Real fingerprint images of size 448×478 (DB_3, FVC_2000), DWT coefficients are obtained using Daubechies wavelet at the 3rd level, Each subband is partitioned in blocks of size 1616 (256 coefficients/block), The performance of the decoder is evaluated by the Bit Error Rate (BER), Compare the performance with the multibit decoder proposed by Song (2005). Simulation results were conducted on real fingerprint images of size 448×478 chosen from ‘Fingerprint Verification Competition’ (DB_3, FVC2000) database, chosen to take into account the different quality of fingerprint images. DWT coefficients are obtained using Daubechies wavelet at the 3rd level, Each subband is partitioned in blocks of size 1616 (256 coefficients/block), The performance of the decoder is evaluated by the Bit Error Rate (BER), The performance of the proposed decoder is compared with the multibit decoder proposed by Song published in (2005).

Experimental results Original image Watermarked image Image of difference The difference between the host and corresponding the watermarked image, magnified by a factor of 20. As it can be seen, the watermark is concentrated in the region of the ridges, which makes the watermark more secure because any attempt to remove the watermark will affect the ridges which constitute the region of interest. Original image Watermarked image Image of difference Test fingerprint images. Strength is set to 0.26. Image of the difference magnified by 20.

Experimental results (Performance comparison) The proposed decoder outperforms the one proposed by Song. Comparison between the proposed decoder BER and the Song’s decoder BER, computed for different value of the strength. As can be seen in this figure, our proposed decoder outperforms the one proposed by Song for all values of the watermark strength.

Experimental results (Error correcting code “BCH”) - The BCH code increases the successful decoding rate but decreases the number of the hidden bits. The results obtained show that the BER decreases when the strength increases. Visual degradations appear at γ=0.28 (PSNR < 40) and higher, below this value the BER is low and the proposed decoder yields very attractive results. The BCH code increases significantly the successful decoding rate. It is worth mentioning that the use of code correcting error limits the number of the information bits to be hidden. For our example the Nb=36 without BCH code and Nb=16 with the BCH code. Comparison between simulation results BER with and without using BCH code, computed for different value of the strength.

Experimental results (Wavelet Scalar Quantization “WSQ” Compression) The BER of the proposed decoder is lower than that of Song’s decoder. Wavelet-based watermarking is very robust to the wavelet-based compression including WSQ compression. For the sake of completeness, experiments have also been conducted to assess the performance of the proposed decoder in terms of robustness against attacks such as the Wavelet Scalar Quantization (WSQ) compression which is the compression standard adopted by the FBI and many other investigation agencies , mean filtering and additive white Gaussian noise (AWGN). For the influence of the WSQ compression, as can be seen from this plot. The Bit error rate of the proposed decoder Is lower than that of Song’s decoder. And in general, the wavelet based watermarking is very robust to wavelet based compression including WSQ.

Experimental results (White Gaussian Noise Addition) The BER of the proposed decoder is much lower than that of Song’s decoder. The Gaussian noise does not affect significantly the performance of the proposed decoder. In the presence of the white gaussian noise addition, the difference between the decoders is significant. And the gaussian noise does not affect significantly the performance of the proposed decoder.

Experimental results (Mean filtering) Mean filtering alters significantly the visual appearance of the images. The two methods provide quite good results. The mean filtering affects and alters directly the DWT coefficients of high subbands where the watermark is embedded. The first notice about the influence of the mean filtering is that the mean filtering alters significantly The visual appearance of the images. And for the performance of he decoders, the two methods provide quite good results. These results was expected since the mean filtering affects and alters directly the high subbands coefficients Of the DWT where the watermark is embedded.

Conclusions An optimum decoder for fingerprint image watermarking in the DWT domain has been developed. The DWT coefficients are modelled by GGD. The parameters of the GGD are directly estimated from the watermarked image. The proposed decoder provides very attractive results and the BER is within acceptable range of tolerance. Error correcting code enhances significantly the results. The proposed decoder can be used for any host data that are statistically modelled by GGD. In this work, An optimum decoder for fingerprint images watermarking in the DWT domain has been developed. The DWT coefficients are modelled by the generalized Gaussian distribution whose parameters are directly estimated from the marked image. The proposed decoder provides very attractive results and the BER is within acceptable range of tolerance which can be further reduced by using Error correcting code. Although the results shown are concerned with the fingerprint images, the proposed decoder can be applied to any other host data That can statistically be modelled by GGD.